Research Article
Security Evaluation Framework for Military IoT Devices
Table 5
Example of security control conversion into CC component.
| Components | Description |
| FIA_UAU.1 | Timing of authentication, allows a user to perform certain actions prior to the authentication of the user's identity. |
| FIA_UAU.2 | User authentication before any action, requires that users authenticate themselves before any action will be allowed by the TSF. |
| FIA_UID.1 | Timing of identification, allows users to perform certain actions before being identified by the TSF. |
| FIA_UID.1 | User identification before any action, require that users identify themselves before any action will be allowed by the TSF. |
|
|